Risks Involved In Cyber Net And Methods To Prevent Them

downloadDownload
  • Words 1234
  • Pages 3
Download PDF

Summary

The present article mainly concentrates on the risk involved in the cyber net and methods to prevent them. A brief description of the evolution of computers and the internet is given. It also contains the definition of risk assessment and eLearning in the present era of the internet. A list of possible scam hacks to the organization or an individual is stated. What are assets and what could be termed as assets can also be learned? Points on how important it is for an organization to have cybersecurity risk assessments in order to beware of the near future risks to the organization are stated.

Introduction

The world of computers and the internet expanded vastly in the past few decades. The computer was invented even before the internet was known to mankind. Early years computers are not connected to anything but a power socket or an old printer. [1] As the computers started to upgrade, the internet came in the presence and changed the ways a computer could help the man-kind. The internet has connected different parts of the world together. We can talk to our friends or relative anywhere in the world by the use of the internet. We can search or store any kind of information. The Internet can be used to order basic needs of personal and household care sitting at home. This growing usage of the internet has brought many threats to the users of providers. It is important for every to know and understand the possible threats or scams a person could face from cyber risks. Being aware of the possible threats could reduce the amount of damage that the possible attacker can impose.

Click to get a unique essay

Our writers can write you a new plagiarism-free essay on any topic

Task 1 Risk Assessment

The process of examining and distinguishing the further occasions which may affect the assets of an organization, association, or an individual contrarily is known as risk assessment.

E-learning (electronic learning) has recently been the main option for many students, homemakers, and businesspersons. E-learning is the method of learning that completely relies on the internet. E-learning is an innovative, educational, technology that provides exceptional ways for students, homemakers, educators, and businesspersons to gain develop and maintain essential skills and knowledge that they require.

The southern cross university offers a wide range of opportunities for each student to learn and develop necessary skills. The learner can access all the required information through a mobile application or website. It is completely dependent on the internet to acquire knowledge as open threats. As the internet has become a venue for numerous illegals activates, some of which might be confidential or personal in nature. As e-learning is interconnected and open it is open to many security risks as,

I am appointed as a cybersecurity consultant in a southern cross university, I will help the organization to eliminate possible threats in the present and future days. Risk assessment is the process to predict threats and necessary outcomes up to a span of one to two years. With this type of risk assessment approach, we cannot rule the possible threats to the organization in the later future i.e., after two to three years.

Task 2 Critical Asset Identification:

Definition:

Rand Hatfield and Underhill Moore state that anything can be coined as an asset when “the business has acquired them at a cost.” [2] There are few authors who quoted that an organization cannot claim something as an asset unless they are the result of a present or past transaction of the organization. Assets can be of physical or non-physical forms, which are the property of the organization.

Based on the above description we fairly understand what is an asset to the organization. As a cybersecurity consultant, I concentrate on what assets are included under cyber assets. Cyber assets can be hardware, software, technical, informational, and confidential storage of data. Cyber assets are valued by both the organization and a possible attacker, depending on their own reasons. The company values the assets as they play a role in conducting operations, whereas an attacker values them to impose harm.

  1. With the increasing number of students undertaking courses every year, can it be a safety issue to the organization?
  2. Can there be a loss of personal and confidential information through the means of hacking and stealing?
  3. could there be a loss of reputation if some members of the organization violate any policies or rules?
  4. The confidential information of staff and students could be stolen from the hardware of the organization?
  5. Could there be any financial assets of the organization lost or stolen?
  6. The quality of network providers can be affected in any way to the organization?

Task 3 Threat identification

Privacy concerns: This could consider a major critical threat that could have no boundaries on the extent of damage to the organization. The confidential information stolen, or lost could be very vital to the university.

Software Attacks: viruses and worms are a major threat to the function of a computer or mobile device. Deliberate virus or worm attacks on the software can lead to many critical threats. Spreading the virus to a learner’s device should also be taken to account as a threat.

Hardware Failure: when there is an equipment failure or crash of any hard device leading to complete or partial loss of stored information.

Software Failure: this threat could be due to any hardware crash or bugs in the software. Coding problems could also be the reason for software failure.

Act of theft: this threat is not likely to occur but cannot be taken out of a note. Illegally trying to confiscate any equipment or information of the organization.

Human errors: there are chances that the staff of the university can make some errors intentionally or unintentionally while processing any information.

Quality of service: there can be disruption or delay in the quality of service of the provider. Delay in processing the information to the learner because of quality of service.

Task 4 Threat Assessment

Assets Vulnerabilities

Hardware assets are of many types. CPUs, consoles, Desktops Etc., can be termed as hardware assets. Loss or failure of these assets could lead to loss of critical information. Exposure to confidential information can also be possible.

Software failures can lead to loss the data related to the organization or a leaner.

People The increasing number of students in the organization could attract more attackers to the organization.

The database is the core of the organization where all the information is stored. Illegal access to the database can be a critical threat to the organization.

Rules and Regulations Breaching of the rules and regulations by any staff or Students member results in a negative image in the public.

Conclusion

I conclude this article by stating that it is important for an organization or an individual to have knowledge about possible threats and risks involved in the present cyber world and come up with the necessary needs for prevention.

References

  1. Singer, P. and Friedman, A. (2014). Cybersecurity and cyberwar. New York: Oxford University Press, p.2.
  2. Thomas Henry Sander, Henry Rand Hatfield, and Underhill Moore, A statement of Accounting Principles, A.A.A., 1959, p.58.
  3. Moneo J. M., Caballe S. and Prieot J. (2012). Security in Learning Management Systems. eLearning Papers, Catalonia, Spain.
  4. Sood S. K. (2012). Phishing Attacks: A Challenge Ahead. eLearning papers, April 2012. [Online].Available: http://www.openeducationeuropa.eu/en/paper/cyber-security-and-education [Accessed 12 12 2019].
  5. Weippl E. R. (2005). Security in e-learning eLearn Magazine, 2005. [Online]. Available: http://elearnmag.acm.org/featured.cfm?aid=1070943
  6. Anwar M. and Greer J. (2011). Role- and Relationship-based Identity Management for Privacy-enhanced E-learning. The University of Saskatchewan, Department of Computer Science.
  7. Alw N. and Fan I.-S. (2010). E-Learning and Information Security Management. International Journal of Digital Society, vol. Volume 1, no. Issue 2.

image

We use cookies to give you the best experience possible. By continuing we’ll assume you board with our cookie policy.